Search Options

Results per page
Sort
Preferred Languages
Advance

Results 71 - 80 of 268 for hasher (0.05 sec)

  1. ci/official/requirements_updater/README.md

    specific versions. This is necessary to ensure reproducibility of the build.
    The pinned versions of the full transitive closure of TensorFlow's dependencies
    together with their corresponding hashes are specified in
    `requirements_lock_<python version>.txt` files (e.g.
    `requirements_lock_3_12.txt` for `Python 3.12`).
    
    To update the lock files, make sure
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Sat Jun 29 00:19:18 UTC 2024
    - 3K bytes
    - Viewed (0)
  2. guava-tests/test/com/google/common/collect/FauxveridesTest.java

        Set<MethodSignature> methods = new HashSet<>();
        for (Class<?> clazz : getClassesBetween(descendant, ancestor)) {
          methods.addAll(getPublicStaticMethods(clazz));
        }
        return methods;
      }
    
      private static Set<MethodSignature> getPublicStaticMethods(Class<?> clazz) {
        Set<MethodSignature> publicStaticMethods = new HashSet<>();
    
        for (Method method : clazz.getDeclaredMethods()) {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  3. docs/de/docs/tutorial/extra-data-types.md

    # Zusätzliche Datentypen
    
    Bisher haben Sie gängige Datentypen verwendet, wie zum Beispiel:
    
    * `int`
    * `float`
    * `str`
    * `bool`
    
    Sie können aber auch komplexere Datentypen verwenden.
    
    Und Sie haben immer noch dieselbe Funktionalität wie bisher gesehen:
    
    * Großartige Editor-Unterstützung.
    * Datenkonvertierung bei eingehenden Requests.
    * Datenkonvertierung für Response-Daten.
    * Datenvalidierung.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  4. docs/pt/docs/how-to/conditional-openapi.md

    * Certifique-se de ter modelos Pydantic bem definidos para seus corpos de solicitação e respostas.
    * Configure quaisquer permissões e funções necessárias usando dependências.
    * Nunca armazene senhas em texto simples, apenas hashes de senha.
    * Implemente e use ferramentas criptográficas bem conhecidas, como tokens JWT e Passlib, etc.
    * Adicione controles de permissão mais granulares com escopos OAuth2 quando necessário.
    * ...etc.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  5. src/main/java/jcifs/smb1/util/HMACT64.java

    /**
     * This is an implementation of the HMACT64 keyed hashing algorithm.
     * HMACT64 is defined by Luke Leighton as a modified HMAC-MD5 (RFC 2104)
     * in which the key is truncated at 64 bytes (rather than being hashed
     * via MD5).
     */
    public class HMACT64 extends MessageDigest implements Cloneable {
    
        private static final int BLOCK_LENGTH = 64;
    
        private static final byte IPAD = (byte) 0x36;
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 3.6K bytes
    - Viewed (0)
  6. src/main/java/jcifs/util/HMACT64.java

    /**
     * This is an implementation of the HMACT64 keyed hashing algorithm.
     * HMACT64 is defined by Luke Leighton as a modified HMAC-MD5 (RFC 2104)
     * in which the key is truncated at 64 bytes (rather than being hashed
     * via MD5).
     */
    class HMACT64 extends MessageDigest implements Cloneable {
    
        private static final int BLOCK_LENGTH = 64;
    
        private static final byte IPAD = (byte) 0x36;
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 3.6K bytes
    - Viewed (0)
  7. cmd/os-readdir_test.go

    			testResults = append(testResults, result{dir, entries})
    			t.Fatalf("Unable to create file, %s", err)
    		}
    		entries = append(entries, name)
    	}
    
    	// Keep entries sorted for easier comparison.
    	sort.Strings(entries)
    
    	// Add entries slice for this test directory.
    	testResults = append(testResults, result{dir, entries})
    	return testResults
    }
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue May 27 15:19:03 UTC 2025
    - 7.5K bytes
    - Viewed (0)
  8. android/guava-testlib/src/com/google/common/collect/testing/google/SortedMultisetTestSuiteBuilder.java

    import com.google.common.collect.testing.features.Feature;
    import com.google.common.testing.SerializableTester;
    import java.util.ArrayList;
    import java.util.Collection;
    import java.util.Comparator;
    import java.util.HashSet;
    import java.util.List;
    import java.util.Set;
    import junit.framework.TestSuite;
    
    /**
     * Creates, based on your criteria, a JUnit test suite that exhaustively tests a {@code
     * SortedMultiset} implementation.
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 11.9K bytes
    - Viewed (0)
  9. .github/PULL_REQUEST_TEMPLATE.md

    3. Ensure you have added or ran the appropriate tests for your PR: https://git.k8s.io/community/contributors/devel/sig-testing/testing.md
    4. If you want *faster* PR reviews, read how: https://git.k8s.io/community/contributors/guide/pull-requests.md#best-practices-for-faster-reviews
    5. If the PR is unfinished, see how to mark it: https://git.k8s.io/community/contributors/guide/pull-requests.md#marking-unfinished-pull-requests
    -->
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Fri Jun 06 14:40:00 UTC 2025
    - 3.1K bytes
    - Viewed (0)
  10. docs/de/docs/tutorial/security/simple-oauth2.md

    Sie können jedoch nicht vom Kauderwelsch zurück zum Passwort konvertieren.
    
    ##### Warum Passwort-Hashing verwenden?
    
    Wenn Ihre Datenbank gestohlen wird, hat der Dieb nicht die Klartext-Passwörter Ihrer Benutzer, sondern nur die Hashes.
    
    Der Dieb kann also nicht versuchen, die gleichen Passwörter in einem anderen System zu verwenden (da viele Benutzer überall das gleiche Passwort verwenden, wäre dies gefährlich).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 10.7K bytes
    - Viewed (0)
Back to top